Filter interviews by
I applied via LinkedIn and was interviewed in May 2021. There were 3 interview rounds.
MVC stands for Model-View-Controller. It is a software design pattern used for developing web applications.
MVC separates an application into three interconnected components: Model, View, and Controller.
Model represents the data and business logic of the application.
View represents the user interface of the application.
Controller handles the user input and updates the model and view accordingly.
MVP stands for Model-View...
DBMS stands for Database Management System. It is a software system that allows users to define, create, maintain and control access to databases.
DBMS is used to manage and organize data in a structured manner.
It provides a way to store, retrieve and manipulate data efficiently.
Examples of DBMS include MySQL, Oracle, SQL Server, and MongoDB.
DBMS can be used in various applications such as banking, healthcare, e-commerc
I applied via Naukri.com and was interviewed before Sep 2021. There were 2 interview rounds.
let, var and const are all used to declare variables in JavaScript, but they differ in their scope and mutability.
let has block scope and can be reassigned
var has function scope and can be reassigned
const has block scope and cannot be reassigned, but its properties can be mutated
Higher order functions are functions that take other functions as arguments or return functions as their output.
Higher order functions can be used to create more flexible and reusable code.
They allow for functions to be composed and combined in various ways.
Examples of higher order functions include map, filter, and reduce in JavaScript.
Higher order functions can also be used for currying and partial application.
A calculator app built using React
Create a component for the calculator
Use state to keep track of the input and result
Implement functions for basic arithmetic operations
Add buttons for each number and operation
Display the input and result on the screen
Design a database schema for nested comments on a post
Create a table for posts with a unique ID
Create a table for comments with a unique ID, post ID, and parent comment ID
Use foreign keys to link comments to posts and parent comments
Use a recursive function to retrieve nested comments
Event loop is a mechanism in JavaScript that handles asynchronous operations.
Event loop continuously checks the call stack and the task queue.
If the call stack is empty, it takes the first task from the queue and pushes it to the call stack.
Event loop is responsible for handling callbacks and promises.
Event loop prevents blocking of the main thread.
Top trending discussions
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
I applied via LinkedIn and was interviewed in Nov 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed before Aug 2021. There was 1 interview round.
based on 8 reviews
Rating in categories
Senior Software Engineer
5
salaries
| ₹4.8 L/yr - ₹7.3 L/yr |
Software Engineer
4
salaries
| ₹4.5 L/yr - ₹8 L/yr |
Software Developer
4
salaries
| ₹2.4 L/yr - ₹6 L/yr |
Technical Lead
3
salaries
| ₹9.6 L/yr - ₹15 L/yr |
IT Project Coordinator
3
salaries
| ₹4 L/yr - ₹4 L/yr |
Cognizant
Sutherland Global Services
Optum Global Solutions
Hexaware Technologies